Worried about Phishing attacks...?
...now you can start getting worried about Fishing attacks too.
1002 posts • joined 26 Jul 2007
...now you can start getting worried about Fishing attacks too.
Puzzling statistic. Maybe it means that the camera is considered a non-essential element of the phone by its' users.
Now if there was an app for making phone calls, and that had a low rate of downloads, then that would be a tad more compelling.
Cats... as in Schrödinger's cat.
...they've retained the same format of error message we are all familiar with e.g.,
Severity Code Description Project File Line Suppression State
Warning The command ""C:\Users\Nick\source\repos\Bell\packages\Microsoft.Quantum.Development.Kit.0.1.1712.901-preview\build\..\tools\qsc\qsc.exe" --input "Bell.qs" --references "C:\Users\Nick\source\repos\Bell\packages\Microsoft.Quantum.Canon.0.1.1712.901-preview\lib\net461\Microsoft.Quantum.Canon.dll" "C:\Users\Nick\source\repos\Bell\packages\Microsoft.Quantum.Development.Kit.0.1.1712.901-preview\lib\net461\Microsoft.Quantum.MetaData.dll" "C:\Users\Nick\source\repos\Bell\packages\Microsoft.Quantum.Development.Kit.0.1.1712.901-preview\lib\net461\Microsoft.Quantum.Primitives.dll" "C:\Users\Nick\source\repos\Bell\packages\Microsoft.Quantum.Development.Kit.0.1.1712.901-preview\lib\net461\Microsoft.Quantum.Simulation.Common.dll" "C:\Users\Nick\source\repos\Bell\packages\Microsoft.Quantum.Development.Kit.0.1.1712.901-preview\lib\net461\Microsoft.Quantum.Simulation.Core.dll" "C:\Users\Nick\source\repos\Bell\packages\Microsoft.Quantum.Development.Kit.0.1.1712.901-preview\lib\net461\Microsoft.Quantum.Simulation.QCTraceSimulatorRuntime.dll" "C:\Users\Nick\source\repos\Bell\packages\Microsoft.Quantum.Development.Kit.0.1.1712.901-preview\lib\net461\Microsoft.Quantum.Simulation.Simulators.dll" "C:\Users\Nick\source\repos\Bell\packages\System.ValueTuple.4.4.0\lib\net461\System.ValueTuple.dll" --outputpath obj\qsharp\src\" exited with code -1. Bell
Severity Code Description Project File Line Suppression State
Warning The namespace body is invalid Bell C:\Users\Nick\source\repos\Bell\Bell\Bell.qs 1
Warning Symbol Set is undefined Bell C:\Users\Nick\source\repos\Bell\Bell\Bell.qs 17
Warning Symbol Set is undefined Bell C:\Users\Nick\source\repos\Bell\Bell\Bell.qs 18
Warning Symbol Set is undefined Bell C:\Users\Nick\source\repos\Bell\Bell\Bell.qs 35
Warning Symbol Set is undefined Bell C:\Users\Nick\source\repos\Bell\Bell\Bell.qs 36
The sub base will know if they've got intruders... The sheep will no longer be in the field, they will all be following the intruder... bah haha
Unfortunately software writers have very little control over what goes on beneath their code (the operating system), or indeed, the generation of the code itself (the compiler/interpreter/linker). In my days working on GEC mini-mainframes I used to keep a circular buffer log of all data that originated from third-partiy messages or memory locations, which was wheeled out to defend myself when the finger of blame was pointed in my direction. Even so, system and higher priority processes could pull the rug from under that scheme. To do similar on GUI interfaces is just too big an overhead, plus the effort in analysing memory dumps is not practical.
No people claiming to be engineers can apply for a job requiring engineering qualifications or experience, unless they are already working for Oregon as engineers.
The example I gave in the original thread was Casey Jones.
Would he be classified as an engineer, or would Oregon have fined him?
According to the Wikipedia article linked to earlier, Tulip Mania was disrupted by bubonic plague in a trading exchange. The traded good suddenly became illiquid because of this.
Name any run on a bank. How did it effectively kick-off? When people tried to withdraw funds they had in their account and were told "not today". The currency had effectively become illiquid by that action.
Ponzi schemes end when there are not enough people coming on-board, putting money into the kitty to repay earlier investors.
If Bitcoin conversion into traditional currency were to take a long time to effect, or situations like a Denial of Service were to occur, then people would start to wonder whether their money were safe. With no government willing to act to repay investors/ speculators if Bitcoin defaulted, this is the scenario I envisage:-
So let's say a Bitcoin transaction takes longer than you anticipate to complete. Would you complain on Twitter? With Twitter and fake news fuelling the fire, a slight delay could turn into a positive feedback frenzy, and everyone will want out.
Here's my first and final instalment. (All future instalments can be derived by keeping my payment in Bitcoin currency).
This charade will continue until there are some well-publicised instances of people unable to convert to traditional currency, and everyone tries to head for the exit in desperate panic. Due to the time overhead involved in interfacing with the underlying blockchain, meltdown is not far away.
Ha, I can sell you a system that will stop that from happening.
Here's to the ambiguities of the English language--->
They thought that meant it was for scheduling pilots, rather than being a Beta version.
A few days later...
"Yep, got some. They will cost an arm and a leg."
It will be cloudy with patches.
...and if your name is Godfrey Davis then you would have no chamce.
Maybe this is a new concept for exams, but as regards software Microsoft have been doing this for years.
Whereas the old provider might go along with the notion that there is nothing wrong with the infrastructure, the new provider might not subscribe to that view, and will kick ass accordingly. This is the experience I have observed at first hand from the ISP I recommend who are, incidentally, so confident about their service that their contract length is one month.
...then there is an ambiguity there with the prices. Do they include VAT or not?
Isn't that what the Tacomas Narrow Bridge (aka Galloping Gertie) was famous for?
Hmm, that can have unintended consequences.
Suppose you hear of a new cocktail called "angela" and your partner goes and orders one, then you get a swat team arriving ten minutes later.
"Man unlocks wife's phone by waving it at rear of bus."
It was this that enabled them to conquer the security.
I must admit to not reading the whole of this thread, so apologies if this has already been raised.
Out of that 800 programs, how much data is there there which is subject to Data Protection legislation? I would have thought that the DP angle would be sufficient to galvanise the authorities into consolidating the data so that is more easily accessible for such purposes.
Whoa. Let's not put BT's engineers into the same category as their employer, please.
BT Engineers are like hen's teeth when trying to get one out to sort a problem (the threat of having to fork out over £100 if the fault is not BT's is a big deterrent for many people). But when you do manage to get one to come out to fix it I've found that the vast majority really do know their stuff and will not shirk getting the ladder out if needs be. I'm sure they would risk disciplinary action in some cases for going the extra mile, moving sockets and such when it isn't on the jobsheet.
Or if you can't find a van to burn, the cut-down alternative would be the Community Ire Partnership.
The statement from which the above phrase was plucked should be on every single proposal to "The Board", putting forward the argument for not adopting a Cloud first policy.
There are mechanisms in place to help prevent a run on a banking institution, but what would happen if everyone wanted access to their data in The Cloud at the exact same moment in time? Let's say you run a media organisation and some major event occurs. Would normal business for you be possible? Take 7/7 for example, the whole of the cellular network in london seemed to suffer an outage as presumably the emergency services had first dibs on bandwidth. If your organisation were required in some way to cover that event, you wouldn't be able to, even if you did have some eye-watering SLA's in place. Your average SME is sure to be affected - as mentioned in the original article, a company shutting down and starting up their phone system every day: that to me is a major risk factor, regardless of whether the idea is a prudent one or not.
The government's reaction to any lobbying for action in the wake of such events would mean regulating cloud services, which would straight away give such organisations an excuse to hike prices. And guess, what, since you've long since disposed of your on-prem infrastructure, you've no option but to swallow those increases.
It may take customers in excess of 25 minutes for their VM to be spun up. You may like to try again later or, if you have on-premises kit, use that instead.
Switching the datacentre off and switching it back on again resolves the majority of issues.
This is the first personal computer I used (at South Bank Poly):-
Admittedly you only had to program in a JMP instruction to get it to run a PROM routine to accept input from a paper tape reader... which could then be used to load the Intel Assembler.
Which has been around since William Caxton ("use my printing press - no script necessary").
Problem with a per connection block is that each login attempt tends to be from a totally different IP due to the number of zombie's harnessed to do this work. Setting up a freeze on an account basis tends to lockout the legitimate user.
Plugging passwords into a site to determine how secure they are is not a good idea either IMHO. The IP address of the query can be associated with the request and reverse look-ups can enable a hacker to work out who the user is.
Pieces of hate. Pieces of hate.
Chop off a cockatoo. It will stop them reproducing.
Are you sure about that?
I had a heated discussion with my bank today (not one of the shower mentioned). Renewal Debit Card did not arrive despite being posted (they told me) two weeks prior, so I rang to tell them so. They are sending me a new one. In the meantime they've seen fit to cancel not only the one lost in the post, but my current one too! It seems that their system can not differentiate. Muppets.
Half the population has more than one telecomms contract? Assuming that every citizen has at minimum one phone (including young children and babies). Methinks there are some "under the radar" people in that statistic
You don't write tender offer documents do you?
Anyone who has been in this business awhile will surely be aware of the historical limitations of PST mailbox files. The email that took it over the 2Gb limit would cause Outlook to die horribly. Instead of preventing the problem before it occurred (will this email cause a breach of the 2Gb limit? Yes, reject and flag an "over quota" error), Microsoft's solution was to provide tools to repair the inadequacy after the event - possibly rendering important messages irretrievable, and causing downtime whilst the repair was effected. Users were given lessons in checking the sizes of the mailbox, and the result was often a list of PST's in the folder list with complaints about it being difficult to search for old emails if you didn't know the date they were sent/received.
Dumb bug of the week: Outlook staples your encrypted emails to, er, plaintext copies when sending messages
Putting this in perspective Notes was pitched as a heavyweight global all-singing all-dancing application, and sure, the biggest corporations in the world took it on-board and used it as a customisable off-the-shelf alternative to bespoke.
Designing (and using) a product that has such things as distributed/global referential integrity is, of course, a lot more difficult to do than any single group of designers could imagine - IMHO Novell were the masters of such insight, but I'm sure that even they stumbled occasionally.
We criticise the product now for its defects, but why didn't said global corporations do their research prior to embracing it? Methinks that it is the sheep mentality: Such & Such Megacorp is using Notes, it must be ok to use it. [In reality, enlightened users would skirt around the shortcomings, building code in to glue between incompatibilities that they find].
That last paragraph: Copy and paste it and stick it on your wall. In ten year's time, ask yourself. Did history repeat itself?
...and this is a Datto backup:-
Now Hosting McCloud
I was fascinated by the results of adding crystals of various types to a jam jar filled with Water Glass to produce a Chemical Garden.
Prince Rogers Nelson might disagree with you, if he were still alive.
The new name for DynoRod
I wonder if they will Panda to his request.
Question: If a UK company does go down the drain, are non-UK Cloudy providers obligated to continue* to provide service in the same way that they would if they were a UK Utility supplier?
*Once they return from their lie-down.
Takes me back. Who remembers all the G.W. Smith shops in Lisle Street (at least three IRC), plus Odeon Radio in Harrow? Weirdest shop (good prices though) was Chromasonic Electronics which was operated from a sweet shop in Fortis Green Road. You have the vision of them scooping up resistors and sticking them on the scales, along with the fruit salads and black jacks. Talking of kits... who remembers Heathkit in Tottenham Court Road.
EDIT I seem to remember GW Smith and Henrys having quite large catalogs in those days too.
Biting the hand that feeds IT © 1998–2017